Tplmap (short for Template Mapper ) is a tool that automate the process of detecting and exploiting Server-Side Template Injection vulnerabilities (SSTI).

This can be used by developers, penetration testers, and security researchers to detect and exploit vulnerabilities related to the template injection attacks.

The technique can be used to compromise web servers' internals and often obtain Remote Code Execution (RCE), turning every vulnerable application into a potential pivot point.

The modular approach allows any contributor to extend the support to other templating engines or introduce new exploitation techniques. The majority of the techniques currently implemented came from the amazing research done by James Kett, PortSwigger .

Tplmap is able to detect and exploit rendered and blind SSTI and exploit injections in text and code contexts.

The application is currently under heavy development and misses some functionalities.

--os-shell or --os-cmd to execute shell commands via the injection --upload LOCAL REMOTE to upload files to the server --download REMOTE LOCAL to download remote files --bind-shell PORT to bind a shell on a port and connect to it --reverse-shell HOST PORT to run a shell back to the attacker's HOST PORT